We deliver trusted Advisory Automation Audit | that drives results.

Resources
  • All Resources

    Your central hub for security and compliance content.

  • Blog

    Stay informed with expert insights and practical advice on cybersecurity, privacy, and compliance challenges.

  • News

    Get the latest company updates, industry developments, and regulatory changes impacting the cybersecurity landscape.

  • Whitepapers

    Access in-depth research and strategic guidance on risk management, regulatory compliance, and cybersecurity best practices.

  • Case Studies

    See how organizations like yours solved complex cybersecurity and compliance challenges with TrustNet’s solutions.

Knowledge Hub
Guides
  • All Guides

    Get practical step-by-step guides designed to help you navigate audits, improve security posture, and meet compliance requirements.

Edit Template
Login

Secure login to iTrust Platform

Python Developers are Targeted by WASP Stealer in an Ongoing Attack on Supply Chain

Python Developers the Target of WASP Stealer in an Ongoing Attack on Supply Chain

An ongoing supply chain attack has seen the spread of the W4SP Stealer virus. So far, the malicious Python packages have infected over 100 persons. In a technical write-up, Checkmarx researcher Josef Harush echoes that the threat actor is still active and sending out more malicious packages.

The attacker claims that the malware is undetectable to boost sales. This assault is just the most recent case that poses an increased risk to the software supply chain. The malicious code can steal the victim’s credit cards, crypto wallets, passwords, discord accounts, and other sensitive data on the victim’s PC. Stolen data is then sent back to the attacker via a hard-coded Discord webhook address.

The threat actor offers the WASP stealer for about $20 with another claim that it is ‘heavily’ protected. That being said, the ongoing attacks appear to be financially motivated. Checkmarx investigations kicked off when they obtained reports from Phylum and Check Point. The reports claimed to have spotted tens of W4SP stealers deployed to developer’s systems.

The researchers also noted that the attacks were unique owing to their use of steganography to conceal the polymorphic malware. The malware is hidden within an image file that is hosted on Imgur. Once you install the malicious package, a setup.py script is initiated, and more Python packages are deployed to the victim’s system. These packages include Judy, which allows for steganography utilities to be used.

The setup.py script will then download a .png image from Imgur and save it in the operating system’s temp directory. The script then deploys an ‘Isb. Reveal’ function contained in the Judy package to extract hidden code from the downloaded image.

Once the installed code is executed, it obtains another code from ‘hxxp://misogyny[.]wtf/inject/UsRjS959Rqm4sPG4’. The entire process ends when your system is infected with the WASP stealer.

Analyzing the malicious code allowed the expert to come across an open invitation to join the attacker’s Discord server. The server is managed by one user dubbed ‘Alpha.#0001’. The attacker is crafty and creates multiple fake users that appear legitimate while stealing profile descriptions from other popular user accounts. As a result, hundreds of victims have incurred losses due to this campaign.

The same actor has begun operating under the username PyPI (halt) to upload typosquatting libraries. These libraries leveraged the StarJacking technique. For more information on how protect your business today, contact us.

Expert Security Insights

Stay informed with expert-driven security content.